|
Question 1.
When a firewall is between the Nortel Communication Control Toolkit Rls. 6.0 server and the NCCT client, what should be done?
A. change the IP address and port number
B. ensure that the NCCT TCP default port number is changed
C. ensure that the NCCT TCP port is open
D. change the TCP port number only
Answer: C
Question 2.
After the installation of the Nortel Communication Control Toolkit Rls. 6.0 server software, which step is not correct to perform?
A. check the install log to search for "completely successful"
B. do a partial install to fix any operational problem
C. do a complete re-install to fix any operational problem
D. check the database log to search for any "error" or "fail"
Answer: B
Question 3.
For Nortel Communication Control Toolkit installations that also require Contact Center Manager (CCM) Rls. 6.0, the installer must check the operational status of the CCM server.
What best describes the operation of the Meridian Link Services Manager?
A. Manages telephony interface between switch and server.
B. Lets the CCM server interface with third party applications.
C. Interfaces Meridian Mail.
D. Allows third part access via scripting commands.
Answer: B
Question 4.
After you have restored the Symposium TAPI Database?
What is the order in which the following services need to be started?
A. NCCT Data Access Layer Service, NCCT TAPI Connector, NCCT Server Service
Telephony Service, ACDProxy Service
B. NCCT Server Service, Telephony Service, ACDProxy Service, NCCT Data Access
Layer Service, NCCT TAPI Connector.
C. NCCT Data Access Layer Service, NCCT TAPI Connector, ACDProxy Service,
Telephony Service, NCCT Server Service
D. Telephony Service, ACDProxy Service, NCCT Data Access Layer Service, NCCT
TAPI Connector, NCCT Server Service.
Answer: D
Question 5.
Which component is built in Nortel Communication Control Toolkit Rls. 6.0 with the security mechanism between the server and client?
A. TAPI or IPML Connector
B. Transport layer
C. Contact management framework
D. NCCT client application
Answer: B
Question 6.
There is a "Convert Text file" button under the Provider tab of the Symposium TAPI SP for Meridian 1 configuration window, which overlay printout text should be downloaded for the conversion? (Choose three.)
A. LD 23
B. LD 20
C. LD 17
D. LD 22
E. LD 21
Answer: A, B, E
Question 7.
You have just installed Nortel Communication Control Toolkit Rls. 6.0 and want to administer resources.
Which default properties must you configure?
A. Default Terminal Type, Default Terminal Media Type, Default Address Status, and Default
Address Type.
B. Default Address Status, Default Address Type, Default Terminal Type, and Default Terminal
Status.
C. Default Provider, Default Address Status, Default Terminal Media Type, and Default Address
Type
D. Default Provider, Default Terminal Type, Default Terminal Media Type, and Default Address
Type.
Answer: B
Question 8.
After bringing up the Symposium TAPI SP for Meridian 1 Configuration window, which tab is not required to enter data?
A. Log Style Tab
B. Provider tab
C. Meridian 1 Host Tab
D. License
Answer: A
Question 9.
You have just completed a new install of NCCT Rls. 6.0 and have verified that it is configured properly and operational. You have just finished backing up the NCCT Database and wish to backup the Symposium TAPI Database.
Which of the following would you do perform the backup?
A. Run NCCT Database Administrator and Browse to the TAPI Database location
"C:\\Program Files\\Nortel\\CCT\\TAPI" then Click Backup.
B. Make copy of the spdb.mdb file located in "C:\\Program Files\\Nortel\\CCT\\TAPI"
C. Run NCCT Database Administrator and Select the TAPI Database from the Database
Drop Down Menu then Click Backup.
D. Make copy of the m1spdb.mdb file located in "C:\\Program
Files\\Nortel\\Communication Control Toolkit\\TAPI"
Answer: D
Question 10.
When importing system resources to reduce programming time, which two import options are offered? (Choose two.)
A. Import Groups
B. Import Terminal Groups
C. Import Windows Users
D. Import Work Stations
Answer: C, D
|
Question 1. Of the three mechanisms Check Point uses for controlling traffic, which enables firewalls to incorporate layer 4 awareness in packet inspection? A. IPS B. Packet filtering C. Stateful Inspection D. Application Intelligence Answer: C Explanation: Question 2. Which of the following statements about Bridge mode is TRUE? A. When managing a Security Gateway in Bridge mode, it is possible to use a bridge interface for Network Address Translation. B. Assuming a new installation, bridge mode requires changing the existing IP routing of the network. C. All ClusterXL modes are supported. D. A bridge must be configured with a pair of interfaces. Answer: D Explanation: Question 3. Which SmartConsole component can Administrators use to track remote administrative activities? A. WebUI B. Eventia Reporter C. SmartView Monitor D. SmartView Tracker Answer: D Explanation: Question 4. Which of the following statements is TRUE about management plug-ins? A. The plug-in is a package installed on the Security Gateway. B. A management plug-in interacts with a Security Management Server to provide new features and support for new products. C. Using a plug-in offers full central management only if special licensing is applied to specific features of the plug-in. D. Installing a management plug-in is just like an upgrade process. (It overwrites existing components.) Answer: B Explanation: Question 5. UDP packets are delivered if they are _________. A. A legal response to an allowed request on the inverse UDP ports and IP B. A Stateful ACK to a valid SYN-SYN-/ACK on the inverse UDP ports and IP C. Reference in the SAM related Dynamic tables D. Bypassing the Kernel by the “forwarding layer” of clusterXL Answer: A Explanation: Question 6. The Check Point Security Gateway's virtual machine (kernel) exists between which two layers of the OSI model? A. Session and Network layers B. Application and Presentation layers C. Physical and Datalink layers D. Network and Datalink layers Answer: D Explanation: Question 7. The customer has a small Check Point installation, which includes one Linux Enterprise 3.0 server working as the SmartConsole, and a second server running Windows 2003 as both Security Management Server and Security Gateway. This is an example of a(n): A. Stand-Alone Installation B. Distributed Installation C. Hybrid Installation D. Unsupported configuration Answer: D Explanation: Question 8. The customer has a small Check Point installation which includes one Windows 2003 server as the SmartConsole and a second server running SecurePlatform as both Security Management Server and the Security Gateway. This is an example of a(n): A. Unsupported configuration. B. Hybrid Installation. C. Distributed Installation. D. Stand-Alone Installation. Answer: D Explanation: Question 9. The customer has a small Check Point installation which includes one Windows XP workstation as the SmartConsole, one Solaris server working as Security Management Server, and a third server running SecurePlatform as Security Gateway. This is an example of a(n): A. Stand-Alone Installation. B. Unsupported configuration C. Distributed Installation. D. Hybrid Installation. Answer: C Explanation: Question 10. The customer has a small Check Point installation which includes one Windows 2003 server as SmartConsole and Security Management Server with a second server running SecurePlatform as Security Gateway. This is an example of a(n): A. Hybrid Installation. B. Unsupported configuration. C. Distributed Installation. D. Stand-Alone Installation. Answer: C Explanation:
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.